CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Requirement Risk Identification: A Practitioner's Approach

by Halima Sadia, Md. Rizwan Beg, Md. Faisal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Number 15
Year of Publication: 2014
Authors: Halima Sadia, Md. Rizwan Beg, Md. Faisal
10.5120/17890-8886

Halima Sadia, Md. Rizwan Beg, Md. Faisal . Requirement Risk Identification: A Practitioner's Approach. International Journal of Computer Applications. 102, 15 ( September 2014), 13-15. DOI=10.5120/17890-8886

@article{ 10.5120/17890-8886,
author = { Halima Sadia, Md. Rizwan Beg, Md. Faisal },
title = { Requirement Risk Identification: A Practitioner's Approach },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 102 },
number = { 15 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 13-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume102/number15/17890-8886/ },
doi = { 10.5120/17890-8886 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:33:10.644464+05:30
%A Halima Sadia
%A Md. Rizwan Beg
%A Md. Faisal
%T Requirement Risk Identification: A Practitioner's Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 102
%N 15
%P 13-15
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Software project development has always been associated with high failure rate. The failure of a software project depends on rooted risks. These risks don't come into face at early stages of requirement gathering and analysis which carried on in the further phases of development greatly affects the cost of a software project. Researchers consider requirements uncertainty and risk as a problem to be addressed during the early stages of software development. It is a well known fact that it is more feasible to make changes to the software system under development in the early stages of the software development cycle. However, there are a very few techniques available for assessing risk at the requirements level and those that are available are highly subjective and are not based on any formal design models. In this paper, a method has been proposed to implement inspection technique for identifying the key requirement risk factors responsible in achieving successful outcome and use a Bayesian network approach to establish a model for predicting the risks that leads to fail a software projects.

References
  1. Standish Report 2009
  2. Software Requirement Risk Assessment Using UML.
  3. K. E. Wiegers, "Software requirements", Microsoft press 1999.
  4. Lamswede, A. Requirements Engineering in the Year 00: A research perspective. In proceeding of the 22nd International conference on Software Engineering (ICSE'2000), Limerick, Ireland, 5-19, ACM Press
  5. S. Nayak, R. Khan and R. Beg "Evaluation of Requirement Defects: An Implementation of Identification Technique" ICIET2012, Journal of Procedia Technology
  6. Laskey, K. , Bayesian Inference and Decision Theory, SYST 644 Class Notes . Dept. of Systems Engineering, George Mason University,http://ite. gmu. edu/-klaskey/SYST664/SY ST664. html Spring 2003.
  7. Lan Yuqing, Zhao Tong, Bayesian Network to Construct Interoperability Model of Open Source Software, International Conference on Computer Science and Software Engineering,2008
  8. Deborah Ashby , Bayesian statistics in medicine, Paper Celebrating the 25th Anniversary of Statistics in Medicine, STATISTICS IN MEDICINE,2006.
  9. Stamelos,I. ,Angelis,L. ,P. ,&Sakellaris,E. on the use of Bayesian Belief Network for the prediction of software productivity, Information and software Technology,200 3.
  10. Ward,S. ,&Chapman,C. Transforming project risk management into project uncertainty management, International Journal of Project management,200 3.
  11. Norman Fenton•,b• ' ,Martin Neil'•b',et aI, Predicting software defects invarying development lifecycles using Bayesian nets. Information and Software Technology 4 9,200
  12. Wooff,A,D. , Goldstein,M. ,&Coolen,P. A. F. , Bayesian graphical models for software testing, IEEE Transactions on software Engineering, 2002.
  13. Y. P. Wu, Q. P. Hu, K. L. Poh, S. H. Ng and M. Xie, Bayesian Networks Modeling for Software Inspection Effectiveness, I I th Pacific Rim International Symposium on Dependable Computing, 2005
  14. Cooper G. . Computational complexity of probabilistic inference using Bayesian belief networks[A]. Artificial Intelligence. 1990
  15. Neil M. , Littlewood B. , Fenton N. , Applying Bayesian Belief Networks to Systems Dependability Assessment. Proceedings of 4th Safety Critical Systems Symposium, Germany: Springer Verlag, 1996
  16. Xiaoxu Wang "Software Project Schedule Variance Prediction Using Bayesian Network" 2010 IEEE
Index Terms

Computer Science
Information Sciences

Keywords

Software development Requirement Risk Bayesian Analysis Inspection Technique